Browsing category

News

Cross-browser tracking vulnerability compromises user anonymity

The vulnerability affects top browsers including Chrome, Firefox, Safari, and even Tor. It is not unusual for a user to switch between using different browsers for different browsing activities and those who have made this into a routine may even be at risk because a security researcher and developer at FingerprintJS, Konstatin Darutkin, recently discovered […]

Top Certifications for Network Security Administrators in 2021

From cybersecurity to IT security; the demand for security professionals is at its peak like never before. Here are some certifications that will help you polish your skills. The majority of businesses utilize multiple computer networks in their operations. These businesses rely on these networks functioning correctly and smoothly. The network administrator’s main job is […]

Avaddon hackers steal SIM card data from Telstra service provider

A Melbourne-based service provider called Communication, which is a platinum partner of telecom giant Telstra has become a victim of a series of cyber-attacks including DDoS attacks. Hackread.com can confirm that hackers from the Avaddon ransomware gang are claiming to have gained access to “tens of thousands” of SIM cards. The Australian telecom company supplies […]

Software Review: Stellar Repair for Exchange

When disaster strikes in the Exchange server, you must have a contingency plan in place to recover from it quickly and most importantly, without any data loss. In such a situation, apart from relying on the Exchange native tools, it is suggested to keep in hand a third-party Exchange recovery application, such as Stellar Repair […]

ShinyHunters leak database of Indian wedding portal WedMeGood

The leaked WedMeGood database contains 41.5 GB worth of data which is another massive data leak from ShinyHunters. ShinyHunters, the notorious hacker known for leaking databases of firms like Animal Jam, Mashable, Upstox, and 123RF, etc., is back with yet another high-profile data breach. Lately, the hacker has been focusing on leaking databases of Indian […]

The growing security problem of Bring Your Own Device (BYOD)

Computers, technology, and the internet have brought unmistakable advantages to firms in recent years and have revolutionized how most companies operate these days. However, new tech’s tremendous benefits have come the significant dangers of operating online and the alarming rise in cybercrime globally. In 2021 alone, internet-based crime is expected to total $6 trillion – […]

Babuk ransomware gang leaks DC police data as negotiations fail

The latest leak by the Babuk ransomware gang contains 26GB worth of records. Last month, Hackread.com reported that the District of Columbia’s Metropolitan Police Department (MPD) had become a victim of a ransomware attack. The government agency revealed that the Babuk Locker gang stole nearly 250 GB of unencrypted files from the department’s networks. On the […]

1-click code execution vulnerabilities in popular software apps

The IT security researchers at Positive Security Fabian Bräunlein and Lukas Euler have identified multiple one-click vulnerabilities across various popular software applications that can let an attacker execute arbitrary code on targeted devices. The researchers noted in their research that desktop apps, particularly those that pass user-supplied URLs to be opened by the OS, are […]

A hacker claims to be selling sensitive data from OTP generating firm

The OTP-generating firm has some of the top giants as clients including Google, Facebook, Amazon, Apple, Microsoft, Signal, Telegram and Twitter, etc. A hacker appears to be selling sensitive data they claim to have stolen from an OTP-generating company. This particular company has some of the most popular tech and business giants on its list […]

Hackers claims to be selling 13tb of Domino’s India data

According to IT security researcher Rajshekhar Rajaharia, “If you ever had ordered pizza online from Domino’s India your data is leaked now.” Among other recent hacks that compromised Indian users’ data, a popular pizza outlet in the country, Domino’s India, seems to have undergone a cyber attack as well. According to Rajshekhar Rajaharia, an Indian […]

REvil ransomware gang hits Apple supplier Quanta; warns of data leak

REvil ransomware gang claims to be negotiating with 3rd-parties to sell the alleged stolen data. The infamous REvil ransomware gang (also known as Sodinokibi) is back in action and this time its alleged victim is Quanta Computer Inc., a Taiwan-based manufacturer of notebook computers and other electronic hardware. In a post published by the REvil […]

D.C. Police Department suffers ransomware attack

The group behind the ransomware attack is the Babuk Locker gang. The District of Columbia’s Metropolitan Police Department (MPD), the sole law enforcement agency in the whole district, is the latest victim of a ransomware attack. The high-profile government agency confirmed the news only after the Babuk Locker gang posted about stealing D.C. Police department’s […]

OGUsers hacker forum hacked for 4th time; database leaked

OGUsers was also hacked in May 2019, April 2020, and December 2020. Another day, another data breach hits OGUsers, a cybercrime forum, and marketplace for stolen credentials and financial data. Yes, OGUsers has suffered another data breach in which its entire database has been dumped on a rival hacking forum. It is worth noting that […]

3 Companies that Help SMBs to Improve Their Cybersecurity

The Covid-19 pandemic has created new challenges for entrepreneurs as they adapt functional models where working from home has become the so-called “new normal” scheme. Companies all over the globe continue to hasten their digital transformation, and cybersecurity is their recent major concern. The operational, reputational, compliance and legal implications could be substantial if cybersecurity […]

How is Ransomware Spread in Mobile Phone Devices?

As an Android user, it is vital to keep in mind that ransomware doesn’t just attack your PC devices. Smartphones and tablets are becoming more and more prone to ransomware attacks. How is ransomware spread in mobile phones? Are there ways that you can protect your mobile phone from ransomware spread? What causes ransomware to […]

5 Great Tips To Learn How To Protect From Ransomware

Every business owner and worker needs to learn how to protect from ransomware attacks. Ransomware is malicious software used by hackers to access and encrypt computers and computer networks. As the owner of the device or computer network, the encryption locks you out until you pay the demanded ransom. Only after you have paid are […]

A Discussion on How to Prevent Ransomware Attacks

Is your PC shielded against ransomware assaults? Ransomware is a kind of malware (vindictive programming) which crooks use to extract money. It holds info to payoff with encoding or by keeping clients locked from their gadgets. This article shows you everything to know on how to prevent ransomware attacks. We investigate the various approaches to […]

A Discussion on How to Prevent Ransomware Attacks

Is your PC shielded against ransomware assaults? Ransomware is a kind of malware (vindictive programming) which crooks use to extract money. It holds info to payoff with encoding or by keeping clients locked from their gadgets. This article shows you everything to know on how to prevent ransomware attacks. We investigate the various approaches to […]

Ransomware: The Types of and How to Make Ransomware?

How to Make Ransomware? Ransomware is a type of malware that operates by either locking you out of your computer or mobile device or by manipulating your files in such a way that you cannot access nor utilize them. Ransomware attacks have been on the rise in the recent past, which can be explained by […]

Ransomware: The Types of and How to Make Ransomware?

How to Make Ransomware? Ransomware is a type of malware that operates by either locking you out of your computer or mobile device or by manipulating your files in such a way that you cannot access nor utilize them. Ransomware attacks have been on the rise in the recent past, which can be explained by […]

How To Fix Your Hacked JoomlaSite?

The fact that Joomla has plenty of powerful in-built features make it one of the most used CMS to create websites. Here, one gets access to amazing features like a banner manager, template manager, weblink manager, menu manager, user manager, etc. Unfortunately, its fame is becoming one of the attractive points for hackers to misuse […]